Cryptocurrency exchanges are seeing fraudsters submit doctored photos in an attempt to reset two-step verification on accounts. The ruse appears to have some degree of success, underscoring the difficulties around verifying identity on the internet.
Analytics, artificial intelligence and machine learning are increasingly playing promising roles in healthcare data security, say Ron Mehring, CISO at Texas Health Resources, a large delivery system, and Axel Wirth of Symantec, a technology vendor. They were featured speakers at the HIMSS19 conference.
Improved integration, automation and orchestration are needed to better detect and respond to evolving cyberthreats, says John Maynard, vice president and global security specialist at Cisco Systems.
User behavioral analytics can help better detect indicators of potential threats, both external and internal, says Carl Leonard, principal security analyst at Forcepoint.
Cyber Criminals are increasingly exploiting the Internet services to build agile and resilient infrastructures, and consequently to protect themselves from being exposed and taken over. This session will explain how the correlation of Internet data on multiple levels (DNS, BGP, ASN, Prefixes/IPs) can be used to build...
While organizations have taken countless measures to strengthen the security of their online resources, criminals have begun to eye a far more appealing and lucrative target: the contact center. It's what Gartner calls "an epicenter of vulnerability."
From hard-dollar losses and added overhead to combat the...
As legacy security information management (SIM) technology becomes outdated and less effective, improved customization and flexibility will dictate which providers will lead the pack. Vendors that can provide customization, integrations, and data security position themselves to successfully deliver flexibility,...
In Australia, it can take as few as 15 minutes to steal someone's phone number, a type of attack known as SIM hijacking. Such attacks are rising, but mobile operators have no plans to change the authentication required around number porting, which can be set in motion online with minimal personal information.
A case involving alleged insider theft of protected health information from a hospital in New York illustrates why healthcare organizations need to take extra precautions to prevent similar incidents. Security experts offer recommendations.
The appropriate use of predictive analytics, going beyond a "set it and forget it" approach, could dramatically improve breach detection, says Teresa Grogan, CIO of the consultancy VertitechIT .
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
As a security leader, you're faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up! IT security seems to be a race between effective technology and clever attack methods. However, there's an often overlooked security layer that can...
Ransomware alone cost organizations an estimated $1 billion in 2016, up from $24 million in 2015 and there is no end in sight for 2017! Ransomware, business email compromise, and spearphishing are serious problems that can steal your data, intercept funds, and disable access to your organization's network.
This new...
The recent escalating ransomware attacks have shown that no organization is safe and the effects of those attacks can be devastating. By many reports, ransomware has been already responsible for causing hundreds of millions of dollars in damages, with no end in sight.
Find out how you can help to combat these attacks...
Ransomware is vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. Attacks cause downtime, data loss, possible intellectual property theft, and in certain industries an attack is considered a data breach. Phishing emails, compromised websites and free...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.